›› 2002, Vol. 19 ›› Issue (3): 306-310.DOI: 10.7523/j.issn.2095-6134.2002.3.013
Previous Articles Next Articles
FENG Bin
Received:
Revised:
Online:
Abstract:
Due to the rapid growth of the Internet applications, varied cryptographic protocols, including thses complex protocols with many roles and many cryptographic primitives, have been widely used to achieved various secure requirements in the distributed system. In the large distributed network environment, due to the maximum number of participants involved and the complexcity of run conditions of the protocol, the security characterzation and analysis for protocols is very difficult and complicated. In this paper, we introduce a new algebra system called Cryptographic Protocol Algebra(CPA) that characterizes the algebraic properties of messages involved in the protocol with multiple cryptographic operations. Based on CPA, we propose a new formal model for general cryptographic protocols. And we specify run conditions and security properties of cryptographic protocols in the unbounded network environment by building a formal language. Based on our model, we characterize a coordinated attack mode to protocols, and discuss reduction techniques for the protocol security analysis. Finally we briefly describe a new automatic analysis process for cryptographic protocols.
Key words: cryptographic protocol, formal method, information security, algebra system
CLC Number:
TP393.03
FENG Bin. Formal Model and Security Analysis for Cryptographic Protocols in the Distributed Network Environment[J]. , 2002, 19(3): 306-310.
Add to citation manager EndNote|Ris|BibTeX
URL: http://journal.ucas.ac.cn/EN/10.7523/j.issn.2095-6134.2002.3.013
http://journal.ucas.ac.cn/EN/Y2002/V19/I3/306
1. Burrows M AbadiM, Needham R. A Logic of Authentication, ACM Trans on Computer Systenms 1990, 8(1):18-V362. 卿斯汉.密码学与计算机网络安全.中国计算机学会学术著作丛书.北京:清华大学出版社,2001.128^-1473. Gong 1,Needham R, Yahalom R. Reasoning About Belief in Crytographic Protocols.In:Proc 1990 IEEE Symp Security and Privacy:1990.234-V2484. Syverson P, Oorshot P.On Unifying Some Crytographic Protocol Logic. In: Proc IEEE Symp Security and Privacy.19945. 刘木兰,龚奇敏.密码学进展—CHINACRYPT' 98.见:第五界中国密码学学术会议论文集.1988.1231256. 冯登国.密码分析.中国计算机学会学术丛书.北京:清华大学出版社,2000.115-117